Zero Trust: Why Trusting Less is a Good Idea

 07.01.2026, last updated 08.01.2026

I spent several years selling and implementing ZTNA solutions. Lots of VMware, plenty of Microsoft, some Fortinet. Good products, solid, well-thought-out, with good engineering behind them. The difficult part was almost never the technology—it was explaining what we were trying to solve.

Read more… ( ~19 Min.)

Business Continuity is not a product

 01.01.2026, last updated 08.01.2026

In many organizations, talking about Business Continuity is, in practice, talking about backups. Sometimes the concept is stretched a bit and things like replication, secondary sites, or disaster recovery are added to the mix. It sounds reasonable, technical, reassuring—especially the more terms are thrown in. The problem is that it’s conceptually wrong.

Read more… ( ~18 Min.)

Protect to Enable: How to Integrate Security and Business

 28.12.2025, last updated 08.01.2026

Throughout my career, I have seen the same pattern repeat itself over and over: for many business or operational decision-makers, security appears as a problem, a brake, something that “complicates”, “delays” or “makes things more expensive.” Not as an enabler, not as part of the design, but as an annoying layer imposed from the outside. And the truth is, in many cases, they are not entirely wrong.

Read more… ( ~17 Min.)

FIDO2, passkeys, and hardware authenticators

 18.12.2025, last updated 08.01.2026

For decades, digital security rested on a fragile assumption: that users could consistently safeguard secrets within increasingly complex systems. Unique, long passwords, rotated periodically and never reused. The problem was not a lack of rules, but the unrealistic expectation of human compliance.

Read more… ( ~18 Min.)

Stop rotating passwords

 16.12.2025, last updated 08.01.2026

For years, periodic password rotation was treated as dogma: “you must change your passwords every 30/60/90 days or everything will burn”. Today, based on empirical evidence, real attack telemetry, rigorous studies, and modern frameworks, the technical consensus is clear: forcing password rotation adds little and can sometimes reduce security.

Read more… ( ~8 Min.)

Git, Distributed Version Control

 15.12.2025, last updated 08.01.2026

As I’ve mentioned before, I currently use Git as the repository for all this blog’s content. There, I store both the configuration files and the content itself (text and images) that later generate the functional website using Hugo   . Beyond this specific use case, I believe that knowing Git is fundamental for IT professionals, so I set out to write this introduction to the tool.

Read more… ( ~4 Min.)

Drop the firewall

 14.12.2025, last updated 08.01.2026

Welcome to Drop the firewall. This blog is a technical notebook. A place to write about networking, security, GNU/Linux, cloud computing, and related technologies. Sometimes as practical notes, other times as more conceptual reflections. There is no promise of regular posting or a rigid editorial line: there is curiosity, technical judgment, and a desire to understand how things actually work.

Read more… ( ~2 Min.)